Network attacks and exploitation : (Record no. 19686)

MARC details
000 -LEADER
fixed length control field 03900cam a2200781Ii 4500
001 - CONTROL NUMBER
control field ocn913742234
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230823094712.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu|||unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150713s2015 inu ob 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency N$T
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency N$T
Modifying agency N$T
-- OCLCO
-- IDEBK
-- DEBSZ
-- OCLCO
-- BAL
-- YDXCP
-- DG1
-- OCLCO
-- CDX
-- STF
-- B24X7
-- OCLCF
-- OCLCO
-- COO
-- OCLCO
-- EBLCP
-- OCLCQ
-- DEBBG
-- BAL
-- RECBK
-- CCO
019 ## -
-- 959273207
-- 959873288
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119183440
Qualifying information electronic bk.
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119183448
Qualifying information electronic bk.
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781118987087
Qualifying information electronic bk.
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 111898708X
Qualifying information electronic bk.
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781118987124
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781118987230
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1118987233
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1118987128
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781118987124
029 1# - (OCLC)
OCLC library identifier DEBSZ
System control number 442835701
029 1# - (OCLC)
OCLC library identifier CHVBK
System control number 339960892
029 1# - (OCLC)
OCLC library identifier CHDSB
System control number 006441166
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000056104417
029 1# - (OCLC)
OCLC library identifier DEBBG
System control number BV043397940
029 1# - (OCLC)
OCLC library identifier DEBBG
System control number BV043892434
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)913742234
Canceled/invalid control number (OCoLC)959273207
-- (OCoLC)959873288
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HF5548.37
Item number M665 2015eb
072 #7 - SUBJECT CATEGORY CODE
Subject category code BUS
Subject category code subdivision 082000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code BUS
Subject category code subdivision 041000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code BUS
Subject category code subdivision 042000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code BUS
Subject category code subdivision 085000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.4/78
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Monte, Matthew,
Relator term author.
245 10 - TITLE STATEMENT
Title Network attacks and exploitation :
Remainder of title a framework /
Statement of responsibility, etc Matthew Monte.
246 3# - VARYING FORM OF TITLE
Title proper/short title Network attacks & exploitation
264 #1 -
-- Indianapolis, IN :
-- Wiley,
-- 2015.
264 #4 -
-- ©2015
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
588 0# -
-- Online resource; title from PDF title page (EBSCO, viewed July 15, 2015).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Computer Network Exploitation -- The Attacker -- The Defender -- Asymmetries -- Attacker Frictions -- Defender Frictions -- Offensive Strategy -- Defensive Strategy -- Offensive Case Studies.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc This book provides a roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. It helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. --
-- Edited summary from book.
526 ## - STUDY PROGRAM INFORMATION NOTE
Department Computer Science and Engineering
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Business enterprises
General subdivision Computer networks
-- Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes
General subdivision Prevention.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Corporations
General subdivision Security measures.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BUSINESS & ECONOMICS / Industrial Management
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BUSINESS & ECONOMICS / Management
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BUSINESS & ECONOMICS / Management Science
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element BUSINESS & ECONOMICS / Organizational Behavior
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Business enterprises
General subdivision Computer networks
-- Security measures.
Source of heading or term fast
-- (OCoLC)fst00842535
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer crimes
General subdivision Prevention.
Source of heading or term fast
-- (OCoLC)fst00872068
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
Source of heading or term fast
-- (OCoLC)fst00872484
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Corporations
General subdivision Security measures.
Source of heading or term fast
-- (OCoLC)fst00879928
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Monte, Matthew.
Title Network attacks & exploitation : a framework.
Place, publisher, and date of publication Indianapolis, Indiana : Wiley, c2015
Physical description xviii, 198 pages
International Standard Book Number 9781118987124
Record control number 2014958441
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://dx.doi.org/10.1002/9781119183440">http://dx.doi.org/10.1002/9781119183440</a>
Public note Wiley Online Library
994 ## -
-- 92
-- DG1

No items available.